General
-
Target
loader.bin
-
Size
15.8MB
-
Sample
220626-s4rqjabder
-
MD5
75941eabd47ddaa0529e6bf66068eccd
-
SHA1
34d7b2683a149871591d3629b4da456064331ebd
-
SHA256
5956fe13a88b4ee1006ba35a0c2bb1797c9d925c453c368aac628870ca8ee4ba
-
SHA512
6d64ee77f9f08b3843031825e110a787efe81dddc72355e636659d53cdf697d663ff9c655cd89d41b5afeab88b8a3f7e4a2b049d77eb705e3c6b7ac817ea0c03
Static task
static1
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20220414-en
Malware Config
Extracted
44caliber
https://discordapp.com/api/webhooks/973580174689964083/2sajMUbGeKbojdqVMbPo-qtidMXn5a7QaYSzjXpRpUgg81vxQoCnZ2D4zH6jyVu9DL96
Targets
-
-
Target
loader.bin
-
Size
15.8MB
-
MD5
75941eabd47ddaa0529e6bf66068eccd
-
SHA1
34d7b2683a149871591d3629b4da456064331ebd
-
SHA256
5956fe13a88b4ee1006ba35a0c2bb1797c9d925c453c368aac628870ca8ee4ba
-
SHA512
6d64ee77f9f08b3843031825e110a787efe81dddc72355e636659d53cdf697d663ff9c655cd89d41b5afeab88b8a3f7e4a2b049d77eb705e3c6b7ac817ea0c03
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-